Fill in the gaps below with the appropriate answers
- …………………………. protects computer systems from illegal intrusions, viruses, data theft, fraud, or other forms of tampering.
- Trojan horse, sleeper and logic bomb are examples of ……………
- A ………………………….. is a group of people who come together for professional and other mutual benefits and are governed by a constitution.
- Internet is an acronym for ………………………………………………..
- …………………….. designs and writes programs that interface with a computer’s low level operating system, such as device drivers and utilities.
- A web search engine is another name for …………………….. engine
- ……………………. virus is also called cavity virus
- …………… can be disguised as attachments of funny images, greeting cards, or audio and video files.
- ………………………. are the individuals that have obtained sufficient education and training in the field of computers and earn their livelihood from their chosen profession.
- Avast, ……………….. and ……………… are some examples of antivirus
- One of the advantages of using search engines is …………………………
- ………………………………. provides professional services for IT bodies in Nigeria.
- ………….. virus infects program files that use macros (commands) such as word processors.
- …………… virus fill up empty spaces between the codes and hence does not cause any damage to the file.
- …………………. is a software system that is designed to carry out web search
- One of the qualities of a good computer professional is ……………………………………………………………………………..
- …………………………… creates the music, voice, and sound effects for multimedia or computer games.
- The full meaning of COAN is ……………………………………………
- …………………… is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
- ……………………. is also called non-resident virus, when executed scans the disks for targets, infects them, and then exit.
- ………….. is the default search engine in Microsoft’s web browser.
- ………………………. designs the menus, icons, and other features that people will use to interact with a computer program or operating system.
- The three major forces that drive the new economy are …………………, ……………… and ………………
- …………………… is the result of the transition from a manufacturing-based economy to a service-based economy.
- ……………………… is one of the causes of digital divide.
- …………………………… is one of the limitations of the old economy.
- The old economy is constrained by ……………………
- The headings of the columns are known as column letters while the headings of the rows are known as ……………………………
- ……………… database model was invented in 1969.
- ………………… are especially affected negatively by digital divide in many ways.
- ……………… language moves nearest to the programmer and away from the machine’s orientation.
- The two types of database are ……………… and ………………
- …………… is a systematic collection of data that is organised in a specific way.
- Hierarchical database model was the first database model to be created and was created in …………
- Users interact with sheets primarily through the ………
- ………………… is a program that enables the computer user to carry out calculation-related tasks.
- ………………… is a collection of rows and columns where you store and manipulate data.
- A computer worm is different from a computer virus because it ………………………………………
- A computer memory is said to be “volatile” if the information stored in it is ………… when there is power failure.
- The keyboard button that erases characters to the right is ……… key
- Information stored in RAM is ………………
- The term e-commerce is described as ……………… through the internet.
- SMS is an acronym for ………………………………………………
- ……………… deals with arithmetic, logical, financial, statistical and so many other operations and therefore makes use of formulas and functions.
- The rectangular box on the worksheet is known as ………………………